• Title/Summary/Keyword: Access Security System

Search Result 1,037, Processing Time 0.024 seconds

Digital Conversion of Analogue Cadastral Maps of Kathmandu Metropolitan City

  • Baral, Toya Nath;Acharya, Babu Ram;Subedi, Nab Raj
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.973-977
    • /
    • 2003
  • Land is the only immovable property that can be used, as a means for agricultural production as well as a means for mortgage for financing industrial or commercial enterprises. Spatial technologies play a key role in managing our land, water and natural resources. Cadastral data is a major component for the development of Land Information System. Therefore, systematic land registration system based on accurate and scientific cadastral map are found inevitable for poverty alleviation, good governance and women empowerment through security of their rights on property, as well as the planning and development of a sustainable environmental protection within Metropolitan city. Digital cadastral parcel is the fundamental spatial unit on which database is designed, created, maintained and operated. Availability of accurate and updated cadastral maps is a primary requisite for successful planning, policy formulating and maintenance of city utility services, which need cadastral and utility information together. Flawed cadastral maps can put land, revenue and taxation system at stake. Kathmandu the capital city of Nepal still is lacking utility maps combining cadastral information with the utility. There is an urgent need to have an effective, accurate and easy to access land revenue and utility services system within the urban areas which could be achieved after the production of reliable base maps and land registration system to guarantee land allocation and property rights which can well be achieved by digital conversion and correction of base cadastral maps. This paper highlights the drawbacks of the conventional cadastral maps and the possible advantages of digital cadastral maps over these. Also the problems, issues and implications during digital conversion and creating database of the same will be discussed.

  • PDF

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

Biometrics for Person Authentication: A Survey (개인 인증을 위한 생체인식시스템 사례 및 분류)

  • Ankur, Agarwal;Pandya, A.-S.;Lho, Young-Uhg;Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • As organizations search fur more secure authentication methods (Dr user access, e-commerce, and other security applications, biometrics is gaining increasing attention. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. Several biometric methods of identification, including fingerprint hand geometry, facial, ear, iris, eye, signature and handwriting have been explored and compared in this paper. They all are well suited for the specific application to their domain. This paper briefly identifies and categorizes them in particular domain well suited for their application. Some methods are less intrusive than others.

  • PDF

System Design and Implementation for New Move Picture Solution EZ-MOV Using FLV (FLV를 이용한 새로운 동명상 솔루션 EZ-MOV 대한 시스템 설계 및 구현)

  • Kwon, O-Byoung;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.79-84
    • /
    • 2009
  • Recently, Move Picture Files have the same file format and a compression technique as Window Media Video form. but Moving Pictures using file format and a compression technique have question about Motion blur and compressibility. In this paper, we design and Implement for new Move Picture Solution EZ-MOV using FLV different from developed FLV(Flash Video) in the Macromedia company. EZ-MOV have advantages as follow. first, FLV player is able to compact disk access time and DRM (Digital Rights Management) with a built-in self and unable to an illegal video recording, second, whenever WMV formal file encoded FLV are able to lossless compression to fifty percent, third, FLV is able to Moving Picture streaming no buffering. fourth, FLV file is able streaming service no streaming server. fifth, FLV file is able to streaming service keep pace with download and streaming. sixth, FLV file is able to full duplex service.

  • PDF

A Study on the Application of CPTED for Crime Prevention in deteriorated Apartment Housing (도심지 내 노후화된 공동주택의 범죄예방을 위한 CPTED 기법 적용방안에 관한 연구)

  • Seo, Won Duck
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.93-98
    • /
    • 2014
  • In a recent survey conducted among Seoul citizens, the demand for crime prevention in addition to settlement of environmental problem and traffic system improvement turned out to be the highest. In particular, the demand for prevention of crimes in residential areas was higher than any other items. The crime rates are especially high in deteriorated residential districts, which indicates the relation between crimes and physical environmental factors. In other words, proper measures for surroundings can prevent crimes. While there may be various ways to keep the residents from crimes safely, CPTED, a crime preventive method in a way of improving the physical surroundings is one of the most noteworthy solutions. The principles of CPTED involves the basic principles such as Natural Surveillance, access control, and securing of territoriality and additional principles of strengthening of Activity Support and Maintenance & Management. This study aims to present a method to lower and prevent crime occurrences by applying the principles of CPTED in deteriorated Apartment Housing in the middle of a city.

Reliability Verification of Secured V2X Communication for Cooperative Automated Driving (자율협력주행을 위한 V2X 보안통신의 신뢰성 검증)

  • Jung, Han-gyun;Lim, Ki-taeg;Shin, Dae-kyo;Yoon, Sang-hun;Jin, Seong-keun;Jang, Soo-hyun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.391-399
    • /
    • 2018
  • V2X communication is a technology in which a vehicle exchanges information with various entities such as other vehicles, infrastructure, networks, pedestrians, etc. through a wired or wireless network. Recently, V2X communication technology has been steadily developed and recently it has played an important role in autonomous cooperation driving technology combined with autonomous vehicle technology. Autonomous vehicles can utilize the external information received via V2X communication to extend the recognition range of existing sensors and to support more safe and natural autonomous driving. In order to operate these autonomous cooperative vehicles on public roads, the security and reliability of autonomous V2X communication should be verified in advance. In this paper, we present test scenarios and test procedures of secure V2X communication for cooperative automated driving and present verification results.

A Secure and Effective Optimal Path Searching Method on Certificate Chains in Mobile Ad hoc NETworks (모바일 애드흑 네트워크의 안전하고 효과적인 치적의 인증경로 탐색 기법)

  • Choi, Sung-Jae;Kim, Yong-Woo;Lee, Hong-Ki;Song, Joo-Seok;Nyang, Dae-Mon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.310-317
    • /
    • 2005
  • In opposition to conventional networks, mobile ad hoc networks usually do not offer trust about nodes or online access through certificate authorities or centralized servers. But, nodes in those systems need process that can search path as well as trust each other to exchange data in safety For these reasons, traditional security measures that require online trusted authorities or certificate storages are not well-suited for securing ad hoc networks. In this paper, I propose a secure and effective method to search the optimized path using profitable flooding techniques on certificate chains in MANETS(Mobile Ad hoc NETworks). This system includes not only using routing protocols that are generally broadcasting packets but also finding nodes securely and verifing the process through tiust relationships between nodes that are searched.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Optimization of Data Placement using Principal Component Analysis based Pareto-optimal method for Multi-Cloud Storage Environment

  • Latha, V.L. Padma;Reddy, N. Sudhakar;Babu, A. Suresh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.248-256
    • /
    • 2021
  • Now that we're in the big data era, data has taken on a new significance as the storage capacity has exploded from trillion bytes to petabytes at breakneck pace. As the use of cloud computing expands and becomes more commonly accepted, several businesses and institutions are opting to store their requests and data there. Cloud storage's concept of a nearly infinite storage resource pool makes data storage and access scalable and readily available. The majority of them, on the other hand, favour a single cloud because of the simplicity and inexpensive storage costs it offers in the near run. Cloud-based data storage, on the other hand, has concerns such as vendor lock-in, privacy leakage and unavailability. With geographically dispersed cloud storage providers, multicloud storage can alleviate these dangers. One of the key challenges in this storage system is to arrange user data in a cost-effective and high-availability manner. A multicloud storage architecture is given in this study. Next, a multi-objective optimization problem is defined to minimise total costs and maximise data availability at the same time, which can be solved using a technique based on the non-dominated sorting genetic algorithm II (NSGA-II) and obtain a set of non-dominated solutions known as the Pareto-optimal set.. When consumers can't pick from the Pareto-optimal set directly, a method based on Principal Component Analysis (PCA) is presented to find the best answer. To sum it all up, thorough tests based on a variety of real-world cloud storage scenarios have proven that the proposed method performs as expected.

Application of Information Technologies for Lifelong Learning

  • Poplavskyi, Mykhailo;Bondar, Ihor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.304-311
    • /
    • 2021
  • The relevance of the research involves outlining the need for modern professionals to acquire new competencies. In the conditions of rapid civilizational progress, in order to meet the requirements of the labor market in the knowledge society, there is a readiness for continuous training as an indicator of professional success. The purpose of the research is to identify the impact of various forms of application of information technologies for lifelong learning in order to provide the continuous self-development of each person without cultural or age restrictions and on the basis of rapid digital progress. A high level (96%) of need of the adult population in continuing education with the use of digital technologies has been established. The most effective ways to implement the concept of "lifelong learning" have been identified (educational camps, lifelong learning, mass open online courses, Makerspace activities, portfolio use, use of emoji, casual game, scientific research with iVR game, implementation of digital games, work in scientific cafes). 2 basic objectives of continuing professional education for adults have been outlined (continuous improvement of qualifications and obtaining new qualifications). The features of ICT application in adult education have been investigated by using the following methods, namely: flexibility in terms of easy access to ideas, solving various problems, orientation approach, functional learning, group or individual learning, integration of leisure, personal and professional activities, gamification. The advantages of application of information technologies for continuous education (economic, time, and adaptive) have been revealed. The concept of continuous adult learning in the context of digitalization has been concluded. The research provides a description of the structural principles of the concept of additional education; a system of information requests of the applicant, as well as basic technologies for lifelong learning. The research indicates the lack of comprehensive research in the relevant field. The practical significance of the research results lies in the possibility of using the obtained results for a wider acquaintance of the adult population with the importance of the application of lifelong learning for professional activities and the introduction of methods for its implementation in the educational policy of the state.